Instructional Video18:42
The Wall Street Journal

Reshaping the Government Role

Higher Ed
The Biden administration took office amid a rising tide of cyberattacks. Associate Deputy Attorney General John Carlin talks about the policies the administration is using to stem attacks and to help protect companies and consumers.
Instructional Video1:20
Next Animation Studio

At least 45,000 Android devices infected with unremovable malware

12th - Higher Ed
Researchers at cybersecurity firms Malwarebytes and Symantec have uncovered an Android trojan called xHelper that is able to reinstall itself even after users have uninstalled it.
Instructional Video3:38
IDG TECHtalk

How to tweak Windows logs to better investigate attacks

Higher Ed
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Instructional Video2:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

Higher Ed
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Instructional Video4:05
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Macro Malware

Higher Ed
You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against...
Instructional Video9:05
Curated Video

Describe the different types of malware that could affect a computer system or network : Ransomware

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video9:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints

Higher Ed
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Instructional Video3:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review

Higher Ed
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
Instructional Video3:13
IDG TECHtalk

Setting up DLP features for email

Higher Ed
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Instructional Video5:16
Curated Video

Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares

Higher Ed
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Instructional Video4:14
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Apple Part I

Higher Ed
You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be...
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video10:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Malware

Higher Ed
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Instructional Video9:21
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - System vulnerabilities, threats, and countermeasures

Higher Ed
CISSP Domain 7: Security Operations: System vulnerabilities, threats, and countermeasures. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Instructional Video5:24
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - CSE-Lab

Higher Ed
In this video, we will look at CSE-lab. This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating VM with PowerShell and...
Instructional Video28:25
IDG TECHtalk

Pegasus spyware and iPhone security

Higher Ed
Amnesty International's Security Lab revealed that a handful of iPhones, mostly belonging to journalists and human rights activists, were successfully infected with Pegasus spyware. While the majority of iPhones users are not affected,...
Instructional Video2:03
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Fake Antivirus

Higher Ed
You will learn about fake antivirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with...
Instructional Video0:55
Next Animation Studio

Iranian hackers target corporate VPN servers

12th - Higher Ed
A new report by cyber security firm ClearSky has found that hackers backed by the Iranian government have been exploiting bugs in corporate VPN servers.
Instructional Video4:21
IDG TECHtalk

Guide to key Windows 10 event logs you need to monitor

Higher Ed
These are the event logs that will help you identify malicious activity on your network.
Instructional Video9:38
Curated Video

Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video15:53
IDG TECHtalk

Windows 10: Answers to your most important issues, Sept 24 | TECH(talk)

Higher Ed
Computerworld contributor Preston Gralla and editor Ken Mingis have returned and are answering questions about Windows 10. If you have questions, feel free to post them in the comments to be featured in our next TECH(talk) about Windows 10.
Instructional Video14:14
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules

Higher Ed
This video introduces you to exploitation modules. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Instructional Video15:16
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Sending Malware with Spoofed Email

Higher Ed
This video teaches you to send malware with spoofed emails. This clip is from the chapter "Developing a Brute Force Attacker" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...